Which of following ...
 
Notifications
Clear all

Which of following would be an acceptable choice?

1 Posts
1 Users
0 Likes
168 Views
(@ripaharris)
Posts: 737
Noble Member
Topic starter
 

Jane is looking for an algorithm to ensure message integrity .

Which of following would be an acceptable choice?

  • A . RSA
    B. AES
    C. RC4
    D. SHA-1

Show Answer Hide Answer

Suggested Answer: D

Explanation:

Integrity. In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire lifecycle. This means that data cannot be modified in an unauthorized or undetected manner.

An important application of hashes is verification of message integrity. Comparing message digests (hash digests over the message) calculated before, and after, transmission can determine whether any changes have been made to the message or file. SHA-1

https://en.wikipedia.org/wiki/SHA-1

SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest C typically rendered as a hexadecimal number, 40 digits long. It was designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard.
 
Posted : 26/10/2022 6:31 am
Topic Tags

Latest EC-Council 212-81 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: